Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
75851d1ed25fb166c5f6312989d35468_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
75851d1ed25fb166c5f6312989d35468_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75851d1ed25fb166c5f6312989d35468_JaffaCakes118.html
-
Size
61KB
-
MD5
75851d1ed25fb166c5f6312989d35468
-
SHA1
ea5e054cede20dfefbf71fe8ca9c1f76bfd0cd5c
-
SHA256
484fda21b22feaa8fb790b5663826ee92cea1b45be1b3bdf48d62534dc0bdead
-
SHA512
c8a8017db5cc2afbd2b31474fdc125155be9e7fcbb70db079c2be0025863c086b77a73feb62ea0d24b81a13e0896fdc158aab95f3f9be66430432071c893cb59
-
SSDEEP
768:OAPIzEZsX3pksEYRkBDsuRPi9j6lEGGjuMvCKxLkTnDIdtm0T983MgZ3kVMhsaap:tP2FUCkO8sl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d7b781fddfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD474CA1-4BF0-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000021ed6dead71cfedd2ddc6b7ab0b6388a47cb8f1b2c9f83361d148cd5536a67f9000000000e800000000200002000000081ff7823de23034af71ff52fcb721953cc1b0ed7bc65edbf426f5e3b81cde34d200000000e67089d610c6a172b18098028b00b51917e2ec4533a0c537d87db689e5ede02400000001490722e1896265245f83d04efd82be4c7c9213d0bb0d15c4b1d6d8578490efedcef275c916a6876741c8b5be29ccd76517ad4a4265e52ef37b6bdbffd836ace iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428230122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1500 2436 iexplore.exe 30 PID 2436 wrote to memory of 1500 2436 iexplore.exe 30 PID 2436 wrote to memory of 1500 2436 iexplore.exe 30 PID 2436 wrote to memory of 1500 2436 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75851d1ed25fb166c5f6312989d35468_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59958de64cb1dafe0b4ea37acb2e9c9dc
SHA1e993a472f649cfbf7f33254f7a13456ed22e575a
SHA256c5fe904b13b7f9a585cc303fc57422c36b6128d23f8f633e8bdbd11eb8015769
SHA512d6c5596c4dd28a9515b07504fb06dcd37af8b654e2131538fe011d094076fcb428730b391efbe7b52e76ef2e3b81b0aaa1f4577523326c8574f7068f09baf769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2e5f73fad9c8e13443627619f83009
SHA18b64eccff40dd57b000ac14c07f52667feaaeab2
SHA256945150248ad329d829ca32c6833dfd430180f5b01a8c4508ba9859e6e78c5a43
SHA5121d9aab8dc3ddf38d61ab4c6da693ffb43087b357784b7e5cd59de8646bdc738ef7cd27f77ae8d12578981d53d8992515b348fadef5711e56a3deb9ec57404635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53588e2829e22266c404c0f7b08c4880d
SHA1e441681f5908241ebd974e691d37ae73d34a2d09
SHA256bae8514f3a2f66126764c97e7d88d5a503f85eb84f643c3c9cfc458a0c198c50
SHA5128168011c0a3ff1634f6949313a946367772684b458ee127e1d9b2efe9031b90389f793f4e4a057443a29a915a976303b54c7861f8ec31ecef8adc321ed9d9c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7be170aed7663e518c0b6b8f5ccac6
SHA1970c230b0fff8f8dcb02230b34df3fececc4f0f0
SHA2561e4d75c79d53ad2adfbeb3eb9d3d0fe9d91319b58c49c3d6f6f37f52c290094e
SHA5129e8a0ff17e042a735db129f8fb6c9da9b0a288e17e7bad6ecac7eb88d25e026ac274669c076a9bba0c7bc64453d29cc0eb8863eaeb79667021b9b6657616b994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d11394b56830610d43e98581250106
SHA17f6e48fdf4d0715f52ba5b13dd7732c13bf07957
SHA256f4b0c27fc5c02ccc62080e026da5bb677e7d55d568d9cbd248ce04b0d8569531
SHA5128a0511498748fcf43f9f80e07fbe390aee75f56420d093997d4611217a7999ee323bd1bc0fcc84d58b66f43049122be1b8af4bd49da7bba16f5be27842782d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a6817d76c045abd41c92f5767bc975
SHA152a54eadb79c0b80619e3bdb04a1d6cd55121ca7
SHA256199381901adfc2a948220519b6a51276dd1b5826efebe3e12d8de6b3157da0fd
SHA512af221c59ca19bf99cf36dc22831e8b0adafe7667a1d6f2cc9f5a626a35ebd5618c2ee1c8c79928ecb17b2fbaff083686483fb1e1caaaaf6bd90c6b05ae942a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448167e1f3e7ab35f4671b8810a15682
SHA13221121933fa0960627d8d5cec932c4ea6db49a0
SHA256e1713e4cb3ce016dce5160047c43d5ff4f4a3d15d04cdac560041ee7540831a0
SHA512ba639a904a51070d5441133294b588835a9a3ce033579e4abca91aeac7b7af568232b3e1896be18db7787c21e6137f966d9c624474c4672d52d85840625add68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dae86eea22dfd85f6335d792365b5fe
SHA184c58fd590821cad87269097c053e537ff0aba68
SHA25612de9989f76a2fa636f25d0efcacc74e48a4253c879d085e5c2eb01a661ad092
SHA512594c74a6555841dc288c670076cbf9e4a4dd3ee879d6c2089afa02217ad4ba2e45eb29086af37207c3e5f5f4b85eb199acd3b1515ec8905b2b822a18cef8a5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a26c18b048cb90b6307e0b3e4c027d
SHA1b85b08fab736ecbf97d4cd192ef68a3ddfd3525e
SHA256c85396d2e0dac910180b51a20e2b64488e85eb50d250b692f523f75ddecb3e61
SHA51214efede8eb79d4daff696334c1ac59dddbb60288253931ea5246d87fc52eeb0fe99673b19253cafb13d7c74ff321a9a7604328dc12040d128aa3cffaf57d09e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4b0994fb1d33b5d23bcf5690c93ed5
SHA130f1e33939c7c3090af2ec4004b578f837476bb2
SHA25637384fa7e91eb89a8ad1ae55a0cc34267f2d20b7c0d29a0df501d878b387b5da
SHA5127f379c4dd2da75edbf546eb1b2e80dda343381c7468e311c31c2e6fc68d1029bc8ca2c8669b081b305a9d50687e8607c0beb7365ac3e6f488cbf15145d1ea2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950fad80061f849a1dc9801c6be947ef
SHA1e9c3f8e7d7ba950eff4321ed273bb30e3f5c50cf
SHA256b3f6c3482527bbf0b7f3d69e024ea2d52123d403aa4de28cbeb512033e835d0b
SHA512a4f8a7d1b37ac80fc9a2c7393d556fb280bf33daff94908ea1326015ebbe0d19f5de0389e3e496a84bc7a239899da3d3c3113844d81fffa12fa320ce4a2bf177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6576b4d7b094ab589576a47aff808b2
SHA151603b2870ad21aaa2d3806dd8ddfb5e12dc289c
SHA256bfb2c4159161a62c5a85180866405f7502491e503adcf29af51e1cf3f9136906
SHA512a96345744f89b4a99b83932922a9d5d003b5b4dba4e57600271d1ee57e53e86abf1440845cadd26153df13abdd56ed180b6447a1a9630bf01a605bb15f652bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af8ced5e9d15de8aab1c4c07253fd7e
SHA1a57af63eff43b0dbf74ec71fe9b338ff5112e47b
SHA2561d3a5393d84ab202110409d3435a42f0deb51497560d79f9d547949645ca788f
SHA5120cf245a4918176aa606a08682ae981a9d43235335a67a9a77f257406398a1bba15e235e15a975c0d67a3851ec6b0a5c7b13b88b77482d9a9c599682168fe0458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ad4c23e76eb8569c561cf722f31e7c
SHA18d1b6bb2bd04b25537ce9dcfb2a8e80139cfa488
SHA256e68e65aead3e36ca34a07310722ed6e0b306ae4950f5094bb5b47dd2b0687317
SHA5124fa12c5a7acd73d4f2b659babdad80749908f2941ced9a2ab9de666a2dd53528123b280ac924dbc1e45939242d1f9c7ab9310797804f749051422249d88cb05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a724e4d1410accef291980748ea361
SHA189dc0793db847b7d1245c229db92e2b00717357f
SHA256951cd090eace48e51e5452eba73355e496cfac89d998a1d9fc7809ba0b8cfdd1
SHA512dd078451a5ec3b52357910251909db0bea5aec9681bd4049d324d9004e46d1ebaefa470d74f04cbb39fda4c1c8cd1703719821ac81e6019b5b72049a57f6fd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7786ab027a05d5bcb148e1bf80a7b4a
SHA1a9ed2a3aa7e1a8b1e1f37cf273fc4124d9dd5cd0
SHA25679481a4aecc7333dc79f073d8819904adde7e8d90060cc1046218be6a52714ee
SHA512eb40bd75769ebb86bc86f04a4ba163ef7b8c9d8fcdda6582e906bf7e24f4a4a94457057c3dad8382828b98f608c1f9893f20874c3690a019148518868a89ab29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f26648e6793f0e271c4665e869142a
SHA17db33573c91f0374187abf9f22b618a8c8937948
SHA256acb41538a5b7c6e439ae9a54cc7f093e1da4b982676a9a6585197220dec216f4
SHA5123c6cf24e83762e5303b23999ef358e8f56c0d4299abaf679dbc77699e08da2e22ee4f624108044b64ad3e6b9b392db2781b9f45451674970a2ce6967aabfa294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914a04fedda58e4d8b4957121a592a55
SHA1b66ca389dde9cd8b282d9134b75a5c5819b42de3
SHA2562ff38c8d0b44f41c16f2ff95854ef5d1475b39d74f6e624ac973f523721d422e
SHA51288aab52b88f36101022701a4d19cd8b62472960739c23b2751e2bbe45936696b72f485400210799c02828dcb3963661be3518a9b40125c79b1fa4bd10a33980d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e73974fbdbeefa09ece1ed1bd87359d
SHA111f1ccd7f8de728407b47413f3debdb9b5e4255f
SHA256f408850e5dc053112779e1fbe1b40cef348bcc7fb18457fd4cf9e50eea69a141
SHA512db2d611bed239d6f0a6d2f4d4f76158e827b81e0955aef37215e39e0347410b9eab01a47d49da4b4495ef2355d01d2bfaa1204628893c8d9fb496c7855366275
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b